top of page

Other Services 

Professional Services
(Vulnerability & Security Posture Assessment Services)


Network Assessment

Having a detailed understanding of your Organisation Network Infrastructure such as Server Hardware, Virtualization, Private Cloud, Public Cloud, Network Switches, Wireless, Application or even anything related to Cyber Security Components is essential prior to planning changes or further investment. Having a reference point in the form of a comprehensive and focused report is an extremely valuable asset.

Networks are always evolving to deal with the needs of a dynamic and growing business. As new technologies arrive they must be assessed thoroughly prior to deployment.

A Network Assessment gives you a State-Of-The-Art platform with which to accurately assess what your network needs as your business changes. Whether it’s rapid expansion, relocation, downsizing, adjustments or simply expanding capacity, a Network Assessment is an essential pre-requisite.

Network Penetration Testing

OSI Technology Penetration Testing (ethical hacking) services test the security of your Network Infrastructure Information Systems, by identifying and exploiting weaknesses. Our Certified CyberSec Team profile your organisation from the perspective of its most likely threats, examine your business processes, information flows and the technology that supports your operations. This allows us to determine the resilience of your environment to malicious attempts to penetrate your systems.

OSI Technology has a documented, tried and tested, penetration testing methodology based on industry best practices such as the OSSTMM (Open Source Security Testing Methodology Manual) and the PTES (Penetration Testing Execution Standard). This ensures that you receive reliable, repeatable results, and minimises the risk to your systems under test.

Our Certified CyberSec Team uses an arsenal of Penetration Testing Tools similar to those used by attackers on the internet - in conjunction with in-house developed, commercial, and best-of-breed open-source penetration tools. Keeping up to date with the latest security vulnerabilities, trends and hacking techniques is our business.

OSI Technology produce a comprehensive business risk-focused Penetration Testing Report covering the approach taken, the techniques used, and the vulnerabilities identified. We then apply our expertise to make prioritised procedural and strategic recommendations to ensure that your systems are secure against future attack.


Policy Compliance (ISO/IEC 27033-1:2015)

ISO/IEC 27033-1:2015 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services, and end-users, in addition to security of the information being transferred across the communication links.)

It is relevant to anyone involved in owning, operating or using a network. This includes senior managers and other non-technical managers or users, in addition to managers and administrators who have specific responsibilities for information security and/or network security, network operation, or who are responsible for an organization's overall security program and security policy development. It is also relevant to anyone involved in the planning, design and implementation of the architectural aspects of network security.

Red Team - Offensive Security Service

The purpose of OSI Technology Red Team Service is to provide our clients with a real-time assessment of their security posture, alerting them to any newly discovered weaknesses and advising them on how best to remediate the issue.

The main goals of OSI Technology Red Team are to improve the overall readiness of your organization, provide remediation recommendations to your defensive practitioners, inspect the current performance levels and measure a company’s security controls over a longer duration than a typical penetration test. By combining a number of our services into our Red Team offering we provide the most comprehensive solution to improving your overall security posture.

bottom of page